Baltimore encrypted
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
1163 articles
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
How to steal a million (OK, half a million), or what happened to the Boca Juniors
To protect themselves, businesses need to take a proactive approach, constantly adapting their security controls to the ever-changing threat environment.
Although the suspected leader of the FIN7 cybergang was arrested, malicious activity somehow persists.
Cybercriminals take control of corporate mail accounts to send filter-dodging spam.
Major areas of risk for initial coin offerings that you can and should address before selling a single token.
The source code of infamous, billion-dollar malware was found on VirusTotal. Here’s what we know about it and what to expect next.
Three real-world examples to illustrate the dangers of digital clutter.
It appears the ASUS incident was just one part of the large-scale operation.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Our proactive security technologies uncovered an attempt to exploit another zero-day vulnerability in win32k.sys.
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
A new APT attack targets the diplomatic mission of an Asian country.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
Do you use plugins on your website? Make sure they are updated regularly.
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.